不定项选择题14. Which of the following are considered to be intruders on a computer system?以下哪类人群属于计算机系统的入侵者?
不定项选择题11. Which of the following is a framework defined by the IEEE 802.1 working group that provides a standard data link layer protocol for port-based access control and authentication? IEEE 802.1工作组制定了一种工作在数据链路层、基于端口的访问控制与认证协议。这种协议是:
不定项选择题16. Which of the following are valid inspect policy map actions?以下哪些属于合法的检测型策略图行为?
不定项选择题10. What is assigned to the client as it connects in full tunnel mode?当客户端使用完全隧道模式连接时,SSL VPN网关会为客户端分配?
不定项选择题5. Which of the following traffic is classified as always destined for the control plane?以下哪种流量的目的地总是控制面?
不定项选择题10. The Context-Based Access Control (CBAC) applies policies using which of the following?基于上下文的访问控制(CBAC)采用以下哪些策略?
不定项选择题3. Which command enables port security on an interface?以下哪条命令用于启用端口安全?
不定项选择题22. What issue is mitigated by using certificate-based, rather than group password-based, EZVPN implementations?在EZVPN的实施中,使用基于证书的认证比使用基于组密码的认证能够更好地抵御哪种攻击?
不定项选择题 For proper authentication
不定项选择题4. Which of the following NAT types has a one-to-one relationship without a specificexternal address?以下哪种NAT为一对一映射且不存在指定的外部地址?
不定项选择题4. What can directly influence the strength of protection provided by algorithms such as 3DES or AES?以下哪项能够直接影响加密算法(3DES或AES)所提供的保护强度?
不定项选择题3. Which of the following NAT address types displays the address of the internal hostas seen by external hosts?从外部主机的角度观察,内部主机地址显示为以下哪种NAT地址?
不定项选择题 Prior to the client authentication
不定项选择题2. Which type of VPN architecture allows remote users URL and CIFS file access to internal resources through a web browser?以下哪种类型的VPN架构允许远程用户通过Web浏览器并使用URL和CIFS文件来访问内部资源?
不定项选择题29. Unicast RPF utilizes which of the following to compare source packet information? uRPF采用哪种工具判断数据包的源信息是否合法?
不定项选择题22. The software-based IPS can support which of the same analysis features as the hardware IPS appliances?与硬件IPS设备相比,软件IPS具备前者的哪些分析功能?
不定项选择题2. The route processor is divided into which of the following parts?路由处理器可以划分为以下哪几个部分?
不定项选择题18. Which of the following is the functional device plane that provides the ability to allownetwork administrators to connect to the device to execute configuration commands?哪种功能面允许网络管理员接入设备以执行配置命令?
不定项选择题27. Which of the following are valid steps in the SAFE architectural lifecycle? SAFE架构寿命周期包括以下哪些阶段?
不定项选择题3. Which network topology is in use when multiple sites interconnect with each other dependent upon their communication needs? Each site Can have multiple connections to other sites,but there is no one site that is more important than another. If connectivity is needed between two sites that does not exist, another direct VPN connections added to the network topology. 拓扑结构判断:多个站点根据通信需要相连。每个站点存在多条与其他站点的连接,所有站点的地位是平等的。如果两个站点之间不存在所需的连接,则网络中将生成另一条直接VPN连接。
